Category: Web Attacks

WaterHole tawm tsam

Kev tawm tsam lub qhov dej: yuav ua li cas cov kev hem thawj tsis tu ncua thiab cybercriminals nkag mus rau cov kab ke ruaj ntseg

Kuv thawj qhov kev paub nrog cybercriminal kev ua haujlwm yog los ntawm kev tawm tsam lub qhov dej ntau xyoo dhau los. I visited a Persian website and discovered that it was downloading malware onto visitorsbrowsers. I promptly contacted the site administrator, who informed me that they had no technical knowledge of the issue. It became apparent that
Nyeem ntxiv

credential stuffing

Cov ntawv pov thawj stuffing tsis yog DDoS!

I have heard this many times over the course of the last several years: someone is experiencing a heavy DDoS attack on their website. When I ask them what type of attack they are experiencing, the answer is usually that the bad guys are sending them thousands or even millions of POST requests. When I
Nyeem ntxiv

application ddos attacks

Daim ntawv thov txheej DDoS tawm tsam, thiab txoj hauv kev los tiv thaiv lawv

DDoS (distributed denial of service) and DoS (denial of service) attacks can be broadly classified into three categories based on the layers of the OSI model they target: network layer (Layer 3), transport layer (Layer 4), and application layer (Layer 7). Layer 3 and Layer 4 attacks are typically less complexeven though that they might
Nyeem ntxiv